User Behavior Analysis

Why track data flow?

Dynamic, creative, and successful companies build their development and business around equally thinking employees, who need a quick and easy access to data and information in order to do a good job.

In practice, this often means free access to data that contains sensitive information in terms of company’s know-how, or personal data of clients and other employees, without the management knowing how the employees deal with such information.

Free and uncontrolled data flow poses a security risk for any organization in the form of deliberate or unintentional leakage of sensitive information.

The combination of our solutions SODAT Analytics and SODAT Protection is aimed at preventing precisely this issue.

Who is SODAT Analytics for?

Medium to large companies

Management and Security Administrators, DPOs, IT administrators

Companies which are subject to legislative requirements

Anyone who wants to prevent loss of data and know-how

SODAT Analytics – Reliable Solution

User Behavior Analysis

The system evaluates user activity from the perspective of security (data flow, file movement) and economy (efficient use of PC). The entire solution is built upon modern technologies of machine learning and user behavior analysis. Using these methods, the system detects anomalies in employee behavior and alerts those in charge.

Near-time processing

Very fast processing of monitored data. The data is gathered in ten-minute intervals and immediately transferred for processing. Rapid launch of the results dramatically reduces response time to potential threats.

Data flow overview

Due to tracking and evaluating data traffic through peripherals, internet and e-mails, as well as local and shared drives, you have an immediate overview of the data that is leaving the organization, and the data that is being brought in by the employees.

Easy access to the results

In order to make the monitored data easy to access, we developed a web interface which can be easily displayed in any computer or mobile device inside the organization. It is not necessary to install any application on the endpoint.

Important information in one place

All essential information is displayed in one place called dashboard. It gives you a quick overview of what is going on in your organization. The displayed information include user behavior analysis (anomaly detection) results, comprehensive information about data flow within the organization, external devices usage overview, website access, application use data and much more.